Category: GBHackers

FlyingYeti Winrar Vulnerability Malware
31
May
2024

DDoS-as-a-Service Botnet Backed by Mirai Attacking Gaming

DDoS-as-a-Service botnets are used by hackers to facilitate the most easily and cheaply launch of devastating distributed denial-of-service (DDoS) attacks….

FlyingYeti Winrar Vulnerability Malware
31
May
2024

Hackers Weaponizing MS Office-Cracked Versions to Deliver Malware

Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with…

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks
31
May
2024

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks

Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide….

ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks - GBHackers on Security
31
May
2024

ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks – GBHackers on Security

ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider…

FlyingYeti Winrar Vulnerability Malware
31
May
2024

LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data

Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from…

Hackers Exploiting Stored XSS Vulnerability in WordPress Plugins
31
May
2024

Hackers Exploiting Stored XSS Vulnerability in WordPress Plugins

In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports,…

VirusTotal Celebrates 20th Anniversary, What's Next?
31
May
2024

VirusTotal Celebrates 20th Anniversary, What’s Next?

VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating…

Beware of Fake Browser Updates
31
May
2024

Beware of Fake Browser Updates

eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign involving fake browser updates. This campaign has been responsible for…

CryptoChameleon Kit With Group of Tools Propagate Phishing
30
May
2024

CryptoChameleon Kit With Group of Tools Propagate Phishing

CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to…

Telerik Report Server Flaw - Attacker Bypass Authentication
30
May
2024

Telerik Report Server Flaw – Attacker Bypass Authentication

A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability…

Spring Cloud Data Flow Let Attackers Compromise The Server
30
May
2024

Spring Cloud Data Flow Let Attackers Compromise The Server

A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing…

Okta Warns Credential Stuffing Attacks Targeting Customer Identity Cloud
30
May
2024

Okta Warns Credential Stuffing Attacks Targeting Customer Identity Cloud

Okta, a leading identity and access management company, has warned about credential stuffing attacks targeting its Customer Identity Cloud (CIC)….